fbpx
Insurica
Pay Now
Client Login

Construction Industry: We Don’t Have to Worry About Cyber Attacks?

There was a time when that statement was common—and even accurate. But that statement is far from correct now. In this article, we will address only the two (2) most frequent ‘attacks’ on contractors’ businesses.

“Ransomware”—Securing and holding your information for ransom is rampant in all industries—including construction.  This type of attack is especially costly as it has at least two (2) ‘hits’. One is the ransom demanded to release the key that will decrypt the contractor’s information. The other ‘hit’ is the loss of income due to a shutdown of your project—or your entire business, while you wait for access to information so that you can continue your project or business activities.

The attacker captures, then encrypts confidential information about employees, projects, vendors, bid information, blueprints, financial information, etc.—until a ransom is paid. Whether you pay the ransom, your project or business shuts down, your reputation is harmed and you may have to pay penalties on the project for being behind schedule. The costs continue to rise in this situation, no matter what happens after the ransomware attack.

“Social Engineering”, or computer deception, or trickery is the second most common attack on contractors. Contractors are excellent targets for this type of attack. With construction industry employees working mostly in the field – using laptops, smartphones, and tablets, and with there being so many ‘employees’ on a project that perhaps belong to subcontractors, and with a significant ‘turnover’ of employees in this area, it is easy to see that it is difficult to keep control of all information in these scenarios. This allows the attacker to obtain all the information needed to send false invoices to you on behalf of your legitimate vendors. You pay these invoices, but the money diverts to the ‘hacker’ instead.

So, what can a contractor do to protect their company from these and other cyber exposures? The first step is to get rid of complacency! Accept that you are vulnerable too.

A company’s biggest cybersecurity weakness is it’s people – your employees who inadvertently help the attacker, perhaps by opening a ‘bad’ e-mail allowing access to your system. So training would help this, but with high turnover, it’s a continuing weakness. Consider encrypting your information, change your passwords often, and check with your insurance agent about purchasing a cyber liability insurance policy that includes both coverages.

About the Author

INSURICA
INSURICA

Share This Story

Stay Updated

Subscribe to the INSURICA blog and receive the latest news direct to your inbox.

Subscribe to the blog

Related Blogs

School Security on Election Day: Best Practices for Polling Place Safety

October 28th, 2024|Blog, Education|

Schools often serve as polling places during elections, which presents unique safety challenges. While supporting the election process is important, ensuring the security of students and staff remains the top priority. By coordinating closely with election officials and implementing key safety protocols, schools can strike a balance between facilitating voting and maintaining a secure environment. Below are practical steps schools can take before, during, and after polling day.

Navigating Cybersecurity Challenges in the Construction Industry

October 21st, 2024|Blog, Construction, Trending|

The construction industry is continuously moving toward digitization, adopting advanced technology such as artificial intelligence, the Internet of Things (IoT) and Building Information Modeling software. These innovations help to automate tasks, reduce waste and improve efficiency, productivity and safety.

Go to Top